As cyber-attacks against critical infrastructure increase and evolve, automated systems to complement human analysis are needed. Moreover, chasing the breaches is like looking for a needle in a haystack. Such organizations are so large, with so much information and data to sort through to obtain actionable information that it seems impossible to know where to start. The analysis of the intelligence of an attack is traditionally an iterative, mainly manual process, which involves an unlimited amount of data to try to determine the sophisticated patterns and behaviours of intruders. This book aims to bring together researchers in the field of cybersecurity and key data to advance the missions of anticipating, prohibiting, preventing, preparing and responding to internal security. The wide variety of topics it presents offers readers multiple perspectives on a variety of disciplines related to machine intelligence and Big data analytics for cybersecurity and privacy. |